Cryptology ePrint Archive: Listing for 2003

2003/265 ( PDF )
Concurrent/Resettable Zero-Knowledge With Concurrent Soundness in the Bare Public-Key Model and Its Applications
Yunlei ZHAO
2003/264 ( PS PS.GZ )
Inversion of Several Field Elements: A New Parallel Algorithm
Pradeep Kumar Mishra and Palash Sarkar
2003/263 ( PS PS.GZ PDF )
Security Analysis of Lal and Awasthi's Proxy Signature Schemes
Manik Lal Das and Ashutosh Saxena and V P Gulati
2003/262 ( PS PS.GZ PDF )
A Secure Modified ID-Based Undeniable Signature Scheme
Sherman S.M. Chow and Lucas C.K. Hui and S.M. Yiu and K.P. Chow
2003/261 ( PS PS.GZ PDF )
A provably secure ID-based ring signature scheme
Javier Herranz and Germ\'an S\'aez
2003/260 ( PDF )
An Improved ID-based Authenticated Group Key Agreement Scheme
Xinjun Du, Ying Wang, Jianhua Ge, Yumin Wang
2003/259 ( PS PS.GZ PDF )
Attack on Two ID-based Authenticated Group Key Agreement Schemes
Fangguo Zhang and Xiaofeng Chen
2003/258 ( PDF )
Analysis of Implementation Hierocrypt-3 algorithm (and its comparison to Camellia algorithm) using ALTERA devices.
Marcin Rogawski
2003/257 ( PDF )
Trading Inversions for Multiplications in Elliptic Curve Cryptography
Mathieu Ciet and Marc Joye and Kristin Lauter and Peter L. Montgomery
2003/256 ( -- withdrawn -- )
On the Security of a Multi-Party Certified Email Protocol
Jianying Zhou
2003/255 ( PS PS.GZ PDF )
Improved Constructions for Universal Re-encryption.
Peter Fairbrother
2003/254 ( PDF )
Committing Encryption and Publicly-Verifiable SignCryption
Yitchak Gertner and Amir Herzberg
2003/253 ( PDF )
Aspects of Hyperelliptic Curves over Large Prime Fields in Software Implementations
Roberto Maria Avanzi
2003/252 ( PS PS.GZ PDF )
On Simulation-Sound Trapdoor Commitments
Philip MacKenzie and Ke Yang
2003/251 ( PDF )
Isomorphism Classes of Hyperelliptic Curves of genus 3 over finite fields
EunKyung Jeong
2003/250 ( PS PS.GZ PDF )
Breaking the Stream Cipher Whitenoise
Hongjun Wu
2003/249 ( PS PS.GZ PDF )
Software Specifications For Tinnitus Utilizing Whitenoise(Revised Feb 2004)
Stephen Boren and Andre Brisson
2003/248 ( PS PS.GZ PDF )
Efficient Implementation of Genus Three Hyperelliptic Curve Cryptography over GF(2^n)
Izuru Kitamura and Masanobu Katagi
2003/247 ( PDF )
ID-based Authenticated Two Round Multi-Party Key Agreement
Xinjun Du and Ying Wang and Jianhua Ge and Yumin Wang
2003/246 ( PS PS.GZ PDF )
Quantum Digital Signature Based on Quantum One-way Functions
Xin L¨¹ and Deng-Guo Feng
2003/245 ( PS PS.GZ PDF )
A Key Substitution Attack on SFLASH^{v3}
Willi Geiselmann and Rainer Steinwandt
2003/244 ( PS PS.GZ PDF )
Efficient Public Key Steganography Secure Against Adaptively Chosen Stegotext Attacks
Tri Van Le and Kaoru Kurosawa
2003/243 ( PS PS.GZ PDF )
An Attack on Not-interactive Designated Verifier Proofs for Undeniable Signatures
Guilin Wang
2003/242 ( PDF )
Improved Weil and Tate pairings for elliptic and hyperelliptic curves
Kirsten Eisentraeger and Kristin Lauter and Peter L. Montgomery
2003/241 ( PS PS.GZ PDF )
Hybrid Broadcast Encryption and Security Analysis
Shaoquan Jiang ang Guang Gong
2003/240 ( PS PS.GZ PDF )
How to Break and Repair a Universally Composable Signature Functionality
Michael Backes and Dennis Hofheinz
2003/239 ( PS PS.GZ PDF )
Universally Composable Signatures, Certification and Authentication
Ran Canetti
2003/238 ( PDF )
Chameleon Signature from Bilinear Pairing
Xinjun Du and Ying Wang and Jianhua Ge and Yumin Wang
2003/237 ( PS PS.GZ PDF )
Low-Cost Solutions for Preventing Simple Side-Channel Analysis: Side-Channel Atomicity
Benoit Chevallier-Mames and Mathieu Ciet and Marc Joye
2003/236 ( PDF )
Combinational Logic Design for AES SubByte Transformation on Masked Data
Elena Trichina
2003/235 ( PS PS.GZ PDF )
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
Yevgeniy Dodis and Rafail Ostrovsky and Leonid Reyzin and Adam Smith
2003/234 ( PS PS.GZ )
Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary
Gene Itkis and Peng Xie
2003/233 ( PS PS.GZ PDF )
Public Key Steganography
Luis von Ahn and Nicholas J. Hopper
2003/232 ( PS PS.GZ PDF )
The Statistical Zero-knowledge Proof for Blum Integer Based on Discrete Logarithm
Chunming Tang and Zhuojun Liu and Jinwang Liu
2003/231 ( PS PS.GZ PDF )
Public-Key Steganography with Active Attacks
Michael Backes and Christian Cachin
2003/230 ( PS PS.GZ PDF )
A Fast Provably Secure Cryptographic Hash Function
Daniel Augot and Matthieu Finiasz and Nicolas Sendrier
2003/229 ( PS PS.GZ PDF )
Algebraic Attacks on Summation Generators
Dong Hoon Lee and Jaeheon Kim and Jin Hong and Jae Woo Han and Dukjae Moon
2003/228 ( PDF )
Verifiably Committed Signatures Provably Secure in The Standard Complexity Model
Huafei Zhu
2003/227 ( PS PS.GZ PDF )
Attacks on a Secure Group Communication Scheme With Hierarchical Access Control
Willi Geiselmann and Rainer Steinwandt
2003/226 ( PS PS.GZ PDF )
On the Security of a Group Signature Scheme with Forward Security
Guilin Wang
2003/225 ( PS PS.GZ )
Masking Based Domain Extenders for UOWHFs: Bounds and Constructions
Palash Sarkar
2003/224 ( -- withdrawn -- )
2003/223 ( PS PS.GZ PDF )
Cryptanalysis of a Cryptosystem based on Drinfeld modules
Simon R. Blackburn, Carlos Cid and Steven D. Galbraith
2003/222 ( PS PS.GZ PDF )
A Verifiable Secret Sharing Scheme with Statistical zero-knowledge
Chunming Tang and Zhuojun Liu and Mingsheng Wang
2003/221 ( PS PS.GZ PDF )
A Cryptanalysis of the Original Domingo-Ferrer's Algebraic Privacy Homomophism
Jung Hee Cheon and Hyun Soo Nam
2003/220 ( PS PS.GZ PDF )
A short comment on the affine parts of SFLASH^{v3}
Willi Geiselmann and Rainer Steinwandt
2003/219 ( PS PS.GZ PDF )
Cryptanalysis of the Repaired Public-key Encryption Scheme Based on the Polynomial Reconstruction Problem
Jean-Sebastien Coron
2003/218 ( PDF )
A Security Evaluation of Whitenoise
David Wagner
2003/217 ( PS PS.GZ PDF )
Chemical Combinatorial Attacks on Keyboards
Eric Brier and David Naccache and Pascal Paillier
2003/216 ( PS PS.GZ PDF )
Secure Indexes
Eu-Jin Goh
2003/215 ( PDF )
Divide and Concatenate: A Scalable Hardware Architecture for Universal MAC
Bo Yang and Ramesh Karri and David Mcgrew
2003/214 ( PS PS.GZ )
Multi-Trapdoor Commitments and their Applications to Non-Malleable Protocols
Rosario Gennaro
2003/213 ( PS PS.GZ PDF )
Isomorphism Classes of Hyperelliptic Curves of Genus 2 over $\mathbb{F}_{2^n}$
Y.Choie and E.Jeong
2003/212 ( PS PS.GZ PDF )
High Performance Arithmetic for Hyperelliptic Curve Cryptosystems of Genus Two
Jan Pelzl and Thomas Wollinger and Christof Paar
2003/211 ( PS PS.GZ PDF )
SFLASHv3, a fast asymmetric signature scheme
Nicolas T. Courtois, Louis Goubin and Jacques Patarin
2003/210 ( PS PS.GZ PDF )
On a Relation Between Verifiable Secret Sharing Schemes and a Class of Error-Correcting Codes
Ventzislav Nikov and Svetla Nikova
2003/209 ( PS PS.GZ PDF )
Using the Trace Operator to repair the Polynomial Reconstruction based Cryptosystem presented at Eurocrypt 2003
Daniel Augot and Matthieu Finiasz and Pierre Loidreau
2003/208 ( PS PS.GZ PDF )
ID-Based Chameleon Hashes from Bilinear Pairings
Fangguo Zhang and Reihaneh Safavi-Naini and Willy Susilo
2003/207 ( PS PS.GZ PDF )
Security Flaws in Several Group Signatures Proposed by Popescu
Guilin Wang, and Sihan Qing
2003/206 ( PS PS.GZ PDF )
Identity Based Undeniable Signatures
Benoît Libert and Jean-Jacques Quisquater
2003/205 ( PS PS.GZ PDF )
Improved Cryptanalysis of SecurID
Scott Contini and Yiqun Lisa Yin
2003/204 ( PDF )
A Composition Construction of Bent-Like Boolean Functions from Quadratic Polynomials
ZENG Xiangyong and HU Lei
2003/203 ( PS PS.GZ PDF )
Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems using Degenerate Divisors
Masanobu Katagi and Izuru Kitamura and Toru Akishita and Tsuyoshi Takagi
2003/202 ( PS PS.GZ PDF )
Yet Another Sieving Device
Willi Geiselmann and Rainer Steinwandt
2003/201 ( PDF )
an attack on a multisignature scheme
Zheng dong & KF.chen
2003/200 ( PDF )
Cryptanalysis of B.Lee-S.Kim-K.Kim Proxy Signature
Zheng Dong , Shengli Liu & kefei Chen
2003/199 ( PS PS.GZ PDF )
Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan
Simon R. Blackburn and Kenneth G. Paterson
2003/198 ( PS PS.GZ PDF )
Construction of Perfect Nonlinear and Maximally Nonlinear Multi-Output Boolean Functions Satisfying Higher Order Strict Avalanche Criteria
Kishan Chand Gupta and Palash Sarkar
2003/197 ( PS PS.GZ PDF )
Revisiting fully distributed proxy signature schemes
Javier Herranz and German Saez
2003/196 ( PS PS.GZ PDF )
Security Analysis of Some Proxy Signatures
Guilin Wang, Feng Bao, Jianying Zhou, and Robert H. Deng
2003/195 ( PDF )
Public Key Encryption with keyword Search
Dan Boneh and Giovanni Di Crescenzo and Rafail Ostrovsky and Giuseppe Persiano
2003/194 ( PS PS.GZ PDF )
Security Analysis of Several Group Signature Schemes
Guilin Wang
2003/193 ( PS PS.GZ PDF )
Efficient Extension of Standard Schnorr/RSA signatures into Universal Designated-Verifier Signatures
Ron Steinfeld and Huaxiong Wang and Josef Pieprzyk
2003/192 ( PS PS.GZ PDF )
Universal Designated-Verifier Signatures
Ron Steinfeld and Laurence Bull and Huaxiong Wang and Josef Pieprzyk
2003/191 ( PS PS.GZ )
Projective Coordinates Leak
David Naccache and Nigel Smart and Jacques Stern
2003/190 ( -- withdrawn -- )
Extending Joux's Protocol to Multi Party Key Agreement
Rana Barua and Ratna Dutta and Palash Sarkar
2003/189 ( PDF )
Cryptanalysis of publicly verifiable authenticated encryption
Zuhua Shao
2003/188 ( PDF )
A New Forward Secure Signature Scheme using Bilinear Maps
Fei Hu and Chwan-Hwa Wu and J. D. Irwin
2003/187 ( PS PS.GZ PDF )
Resource Bounded Unprovability of Computational Lower Bounds
Tatsuaki Okamoto and Ryo Kashima
2003/186 ( PS PS.GZ PDF )
Safe Prime Generation with a Combined Sieve
Michael J. Wiener
2003/185 ( PS PS.GZ PDF )
VMPC Stream Cipher
Bartosz Zoltak
2003/184 ( PS PS.GZ PDF )
What do DES S-boxes Say to Each Other ?
Nicolas T. Courtois and Guilhem Castagnos and Louis Goubin
2003/183 ( PDF )
Certificate-Based Encryption and the Certificate Revocation Problem
Craig Gentry
2003/182 ( PS PS.GZ PDF )
Chosen-Ciphertext Security from Identity-Based Encryption
Ran Canetti, Shai Halevi, and Jonathan Katz
2003/181 ( PS PS.GZ PDF )
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?
Rui Zhang and Goichiro Hanaoka and Junji Shikata and Hideki Imai
2003/180 ( PS PS.GZ )
Parallelizing Explicit Formula for Arithmetic in the Jacobian of Hyperelliptic Curves
Pradeep Kumar Mishra and Palash Sarkar
2003/179 ( PS PS.GZ PDF )
VMPC One-Way Function
Bartosz Zoltak
2003/178 ( PDF )
Constructing Optimistic Fair Exchange Protocols from Committed Signatures
Huafei Zhu
2003/177 ( PS PS.GZ PDF )
Building Secure Cryptographic Transforms, or How to Encrypt and MAC
Tadayoshi Kohno and Adriana Palacio and John Black
2003/176 ( PS PS.GZ PDF )
Patterson-Wiedemann Construction Revisited
S. Gangopadhyay and P. H. Keskar and S. Maitra
2003/175 ( PS PS.GZ PDF )
Double-Speed Safe Prime Generation
David Naccache
2003/174 ( PS PS.GZ PDF )
Relaxing Chosen-Ciphertext Security
Ran Canetti and Hugo Krawczyk and Jesper Nielsen
2003/173 ( PS PS.GZ PDF )
Domain Extender for Collision Resistant Hash Functions: Improving Upon Merkle-Damgaard Iteration
Palash Sarkar
2003/172 ( PS PS.GZ PDF )
NAEP: Provable Security in the Presence of Decryption Failures
Nick Howgrave-Graham and Joseph H. Silverman and Ari Singer and William Whyte
2003/171 ( PS PS.GZ PDF )
Scalable Protocols for Authenticated Group Key Exchange
Jonathan Katz and Moti Yung
2003/170 ( PS PS.GZ PDF )
HARPS: HAshed Random Preloaded Subset Key Distribution
Mahalingam Ramkumar and Nasir Memon
2003/169 ( PS PS.GZ PDF )
Properties of the Transformation Semigroup of the Solitaire Stream Cipher
Boris Pogorelov and Marina Pudovkina
2003/168 ( PS PS.GZ )
Robust discretization, with an application to graphical passwords
Jean-Camille Birget and Dawei Hong and Nasir Memon
2003/167 ( PDF )
Identity-based Chameleon Hash and Applications
Giuseppe Ateniese and Breno de Medeiros
2003/166 ( PS PS.GZ PDF )
A reduction of the space for the parallelized Pollard lambda search on elliptic curves over prime finite fields and on anomalous binary elliptic curves
Igor Semaev
2003/165 ( PDF )
Commitment Capacity of Discrete Memoryless Channels
Andreas Winter, Anderson C. A. Nascimento, Hideki Imai
2003/164 ( PS PS.GZ PDF )
Identity-Based Threshold Decryption
Joonsang Baek and Yuliang Zheng
2003/163 ( PS PS.GZ PDF )
Multipurpose Identity-Based Signcryption : A Swiss Army Knife for Identity-Based Cryptography
Xavier Boyen
2003/162 ( PS PS.GZ PDF )
Cryptanalysis of the Alleged SecurID Hash Function
Alex Biryukov and Joseph Lano and Bart Preneel
2003/161 ( PS PS.GZ PDF )
Indifferentiability, Impossibility Results on Reductions, and Applications to the Random Oracle Methodology
Ueli Maurer and Renato Renner and Clemens Holenstein
2003/160 ( PS PS.GZ PDF )
A More Secure and Efficacious TTS Signature Scheme
Jiun-Ming Chen and Bo-Yin Yang
2003/159 ( PS PS.GZ PDF )
An efficient variant of the RSA cryptosystem
Cesar Alison Monteiro Paixão
2003/158 ( PS PS.GZ )
A Sufficient Condition and Optimal Domain Extension of UOWHF
Mridul Nandi
2003/157 ( PS PS.GZ )
Some RSA-based Encryption Schemes with Tight Security Reduction
Kaoru Kurosawa and Tsuyoshi Takagi
2003/156 ( PS PS.GZ PDF )
Efficient Provably Secure Public Key Steganography
Tri Van Le
2003/155 ( PDF )
A Formal Proof of Zhu's Signature Scheme
huafei zhu
2003/154 ( PS PS.GZ )
ManTiCore: Encryption with Joint Cipher-State Authentication
Cheryl Beaver and Timothy Draelos and Richard Schroeppel and Mark Torgerson
2003/153 ( PDF )
Attack on an Identification Scheme Based on Gap Diffie-Hellman Problem
Zhen-Feng ZHANG and Jing XU and Deng-Guo FENG
2003/152 ( PDF )
Optimal Statistical Power Analysis
Eric Brier and Christophe Clavier and Francis Olivier
2003/151 ( PDF )
Secret sharing schemes on sparse homogeneous access structures with rank three
Jaume Martí-Farré and Carles Padró
2003/150 ( PS PS.GZ PDF )
On the random-oracle methodology as applied to length-restricted signature schemes
Ran Canetti and Oded Goldreich and Shai Halevi
2003/149 ( -- withdrawn -- )
Forward-Secure Hierarchical ID-Based Cryptography
Danfeng Yao and Anna Lysyanskaya
2003/148 ( PS PS.GZ PDF )
A Tweakable Enciphering Mode
Shai Halevi and Phillip Rogaway
2003/147 ( PS PS.GZ PDF )
A Parallelizable Enciphering Mode
Shai Halevi and Phillip Rogaway
2003/146 ( PS PS.GZ PDF )
Breaking and Repairing Optimistic Fair Exchange from PODC 2003
Yevgeniy Dodis and Leonid Reyzin
2003/145 ( PS PS.GZ )
Symmetric Authentication Within a Simulatable Cryptographic Library
Michael Backes and Birgit Pfitzmann and Michael Waidner
2003/144 ( PS PS.GZ PDF )
ID-based tripartite key agreement with signatures
Divya Nalla
2003/143 ( PS PS.GZ PDF )
Elliptic curves suitable for pairing based cryptography
Friederike Brezing and Annegret Weng
2003/142 ( PS PS.GZ )
A New Tree based Domain Extension of UOWHF
Mridul Nandi
2003/141 ( PS PS.GZ PDF )
General Composition and Universal Composability in Secure Multiparty Computation
Yehuda Lindell
2003/140 ( PS PS.GZ PDF )
Trading-Off Type-Inference Memory Complexity Against Communication
Konstantin Hypp\"onen and David Naccache and Elena Trichina and Alexei Tchoulkine
2003/139 ( PDF )
On the Randomness of the Editing Generator
Enjian Bai and Guozhen Xiao
2003/138 ( PS PS.GZ )
Permutation graphs, fast forward permutations, and
Boaz Tsaban
2003/137 ( PS PS.GZ )
Bernoulli numbers and the probability of a birthday surprise
Boaz Tsaban
2003/136 ( PS PS.GZ )
Efficient linear feedback shift registers with maximal period
Boaz Tsaban and Uzi Vishne
2003/135 ( PS PS.GZ PDF )
Collision Attack on Reduced-Round Camellia
Wen-Ling Wu and Deng-Guo Feng
2003/134 ( -- withdrawn -- )
Direct Sum of Non Normal and Normal Bent Functions Always Produces Non Normal Bent Functions
Sugata Gangopadhyay and Subhamoy Maitra
2003/133 ( PS PS.GZ PDF )
Minimum Distance between Bent and 1-resilient Boolean Functions
Soumen Maity and Subhamoy Maitra
2003/132 ( PS PS.GZ )
Guaranteeing the diversity of number generators
Adi Shamir and Boaz Tsaban
2003/131 ( PS PS.GZ PDF )
Homomorphic public-key systems based on subgroup membership problems
Kristian Gjøsteen
2003/130 ( PS PS.GZ PDF )
On the Pseudorandomness of KASUMI Type Permutations
Tetsu Iwata and Tohru Yagi and Kaoru Kurosawa
2003/129 ( PS PS.GZ PDF )
Attack on Han et al.'s ID-based Confirmer (Undeniable) Signature at ACM-EC'03
Fangguo Zhang and Reihaneh Safavi-Naini and Willy Susilo
2003/128 ( PS PS.GZ )
Weak Fields for ECC
Alfred Menezes and Edlyn Teske and Annegret Weng
2003/127 ( PDF )
Using Information Theory Approach to Randomness Testing
B. Ya. Ryabko and V.A. Monarev
2003/126 ( PS PS.GZ PDF )
Certificateless Public Key Cryptography
Sattam S. Al-Riyami and Kenneth G. Paterson
2003/125 ( PS PS.GZ PDF )
Algebraic Attacks on Combiners with Memory and Several Outputs
Nicolas T. Courtois
2003/124 ( PS PS.GZ )
A General Correlation Theorem
Kishan Chand Gupta and Palash Sarkar
2003/123 ( PS PS.GZ PDF )
Assessing security of some group based cryptosystems
Vladimir Shpilrain
2003/122 ( PDF )
Cryptanalysis of Al-Riyami-Paterson's Authenticated Three Party Key Agreement Protocols
Kyungah Shim
2003/121 ( PS PS.GZ )
A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol
Michael Backes and Birgit Pfitzmann
2003/120 ( PS PS.GZ PDF )
Physically Observable Cryptography
Silvio Micali and Leonid Reyzin
2003/119 ( PS PS.GZ PDF )
How Secure Are FPGAs in Cryptographic Applications?
Thomas Wollinger and Christof Paar
2003/118 ( PS PS.GZ )
Visual Crypto Displays Enabling Secure Communications
Pim Tuyls, Tom Kevenaar, Geert-Jan Schrijen, Toine Staring, Marten van Dijk
2003/117 ( PDF )
An identity-based ring signature scheme from bilinear pairings
Chih-Yin Lin and Tzong-Chen Wu
2003/116 ( PS PS.GZ PDF )
A New ID-based Group Signature Scheme from Bilinear Pairings
Xiaofeng Chen and Fangguo Zhang and Kwangjo Kim
2003/115 ( PDF )
Cryptanalysis of ID-based Tripartite Authenticated Key Agreement Protocols
Kyungah Shim
2003/114 ( PS PS.GZ )
Unifying Simulatability Definitions in Cryptographic Systems under Different Timing Assumptions
Michael Backes
2003/113 ( PS PS.GZ PDF )
Security Analysis of Shim's Authenticated Key Agreement Protocols from Pairings
Hung-Min Sun and Bin-Tsan Hsieh
2003/112 ( PS PS.GZ )
Accumulating Composites and Improved Group Signing
Gene Tsudik and Shouhuai Xu
2003/111 ( -- withdrawn -- )
Further Cryptanalysis of some Proxy Signature Schemes
Jiqiang Lv and Jingwei Liu and Xinmei Wang
2003/110 ( PDF )
Proposal on Personal Authentication System in which Biological Information is embedded in Cryptosystem Key
Yukio Itakura and Shigeo Tsujii
2003/109 ( PS PS.GZ PDF )
Crytanalysis of SAFER++
Alex Biryukov and Christophe De Canni\`ere and Gustaf Dellkrantz
2003/108 ( PS PS.GZ PDF )
Novel Cyclic and Algebraic Properties of AES
Tri Van Le
2003/107 ( PS PS.GZ PDF )
Fujisaki-Okamoto IND-CCA hybrid encryption revisited
David Galindo and Sebasti\`a Mart\'{\i}n and Paz Morillo and Jorge L. Villar
2003/106 ( PS PS.GZ PDF )
CWC: A high-performance conventional authenticated encryption mode
Tadayoshi Kohno and John Viega and Doug Whiting
2003/105 ( PS PS.GZ )
On Diophantine Complexity and Statistical Zero-Knowledge Arguments
Helger Lipmaa
2003/104 ( PS PS.GZ PDF )
New Proxy Signature, Proxy Blind Signature and Proxy Ring Signature Schemes from Bilinear Pairing
Fangguo Zhang and Reihaneh Safavi-Naini and Chih-Yin Lin
2003/103 ( PS PS.GZ PDF )
Security analysis on Nalla-Reddy's ID-based tripartite authenticated key agreement protocols
Zhongliang Chen
2003/102 ( PDF )
Length-Based Attacks for Certain Group Based Encryption Rewriting Systems
J. Hughes, and A. Tannenbaum
2003/101 ( -- withdrawn -- )
Cryptanalysis of HFE
Ilia Toli
2003/100 ( PS PS.GZ PDF )
Protocols for Bounded-Concurrent Secure Two-Party Computation in the Plain Model
Yehuda Lindell
2003/099 ( PS PS.GZ PDF )
Algorithms in Braid Groups
Matthew J. Campagna
2003/098 ( PDF )
Side Channel Attacks on CBC Encrypted Messages in the PKCS#7 Format
Vlastimil Klima and Tomas Rosa
2003/097 ( PS PS.GZ PDF )
Low Cost Security: Explicit Formulae for Genus 4 Hyperelliptic Curves
Jan Pelzl and Thomas Wollinger and Christof Paar
2003/096 ( PDF )
Secure Proxy Signature Schemes for Delegation of Signing Rights
Alexandra Boldyreva and Adriana Palacio and Bogdan Warinschi
2003/095 ( PS PS.GZ PDF )
Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack
Yevgeniy Dodis and Nelly Fazio
2003/094 ( PS PS.GZ PDF )
Trace Zero Subvariety for Cryptosystems
Tanja Lange
2003/093 ( PS PS.GZ PDF )
Simple Stateless Steganography
Leonid Reyzin and Scott Russell
2003/092 ( PS PS.GZ PDF )
Provably-Secure Enhancement on 3GPP Authentication and Key Agreement Protocol
Muxiang Zhang
2003/091 ( PS PS.GZ PDF )
Sequential Aggregate Signatures from Trapdoor Permutations
Anna Lysyanskaya and Silvio Micali and Leonid Reyzin and Hovav Shacham
2003/090 ( PDF )
A Structured Multisignature Scheme from the Gap Diffie-Hellman Group
Chih-Yin Lin and Tzong-Chen Wu and Fangguo Zhang
2003/089 ( PS PS.GZ PDF )
Efficient Public Key Generation for Multivariate Cryptosystems
Christopher Wolf
2003/088 ( PDF )
Elliptic Curve Point Multiplication
A.G.Rostovtsev and E.B.Makhovenko
2003/087 ( PS PS.GZ PDF )
A Practical Elliptic Curve Public Key Encryption Scheme Provably Secure Against Adaptive Chosen-message Attack
huafei zhu
2003/086 ( PS PS.GZ PDF )
On the Selection of Pairing-Friendly Groups
Paulo S. L. M. Barreto and Ben Lynn and Michael Scott
2003/085 ( PS PS.GZ )
A defect of the implementation schemes of the TTM cryptosystem
Jintai Ding, Dieter Schmidt
2003/084 ( PS PS.GZ )
Cryptanalysis of an implementation scheme of the Tamed Transformation Method cryptosystem
Jintai Ding, Timonthy Hodges
2003/083 ( PS PS.GZ PDF )
A Forward-Secure Public-Key Encryption Scheme
Ran Canetti and Shai Halevi and Jonathan Katz
2003/082 ( PS PS.GZ PDF )
Stronger Security Bounds for OMAC, TMAC and XCBC
Tetsu Iwata and Kaoru Kurosawa
2003/081 ( PDF )
Primitive Specification for SOBER-128
Philip Hawkes and Greg Rose
2003/080 ( PS PS.GZ PDF )
Non-interactive and Reusable Non-malleable Commitment Schemes
Ivan Damgård and Jens Groth
2003/079 ( PS PS.GZ PDF )
Fast arithmetic on Jacobians of Picard curves
Stéphane Flon and Roger Oyono
2003/078 ( PS PS.GZ PDF )
Relation among simulator-based and comparison-based definitions of semantic security
Yodai Watanabe and Junji Shikata
2003/077 ( PS PS.GZ PDF )
An Uninstantiable Random-Oracle-Model Scheme for a Hybrid Encryption Problem
Mihir Bellare and Alexandra Boldyreva and Adriana Palacio
2003/076 ( PS PS.GZ PDF )
Goldbach’s Conjecture on ECDSA Protocols
N. Vijayarangan, Nitin Agarwal, S. Kasilingam
2003/075 ( PS PS.GZ )
Almost Security of Cryptographic Boolean Functions
Kaoru Kurosawa
2003/074 ( PDF )
Divisible Voting Scheme
Natsuki Ishida and Shin'ichiro Matsuo and Wakaha Ogata
2003/073 ( PDF )
A Scheme for obtaining a Warrant Message from the Digital Proxy Signatures
Sunder Lal and Amit K Awasthi
2003/072 ( PDF )
Proxy Blind Signature Scheme
Amit K Awasthi and Sunder Lal
2003/071 ( PS PS.GZ PDF )
How to Protect Against a Militant Spammer
Markus Jakobsson and John Linn and Joy Algesheimer
2003/070 ( PS PS.GZ PDF )
A Critique of CCM
P. Rogaway and D. Wagner
2003/069 ( PS PS.GZ )
EAX: A Conventional Authenticated-Encryption Mode
M. Bellare and P. Rogaway and D. Wagner
2003/068 ( PS PS.GZ PDF )
On the Security of Some Proxy Signature Schemes
Hung-Min Sun and Bin-Tsan Hsieh
2003/067 ( PS PS.GZ PDF )
Forking Lemmas in the Ring Signatures' Scenario
Javier Herranz and Germ\'an S\'aez
2003/066 ( PS PS.GZ PDF )
Signcryption scheme for Identity-based Cryptosystems
Divya Nalla, K.C.Reddy
2003/065 ( PS PS.GZ PDF )
Hash Function Balance and its Impact on Birthday Attacks
Mihir Bellare and Tadayoshi Kohno
2003/064 ( PS PS.GZ PDF )
On the Optimality of Linear, Differential and Sequential Distinguishers
Pascal Junod
2003/063 ( PS PS.GZ PDF )
Initiator-Resilient Universally Composable Key Exchange
Dennis Hofheinz and Joern Mueller-Quade and Rainer Steinwandt
2003/062 ( PS PS.GZ )
Extending Joux's Protocol to Multi Party Key Agreement
Rana Barua and Ratna Dutta and Palash Sarkar
2003/061 ( PDF )
Hidden Polynomial Cryptosystems
Ilia Toli
2003/060 ( PS PS.GZ PDF )
Isomorphism Classes of Picard Curves over Finite Fields
Jong Won Lee
2003/059 ( -- withdrawn -- )
A Transitive Signature Scheme Provably Secure Against Adaptive Chosen-message Attack
Huafei Zhu and Bao Feng and Robert H. Deng
2003/058 ( PS PS.GZ PDF )
An Elliptic Curve Trapdoor System
Edlyn Teske
2003/057 ( PS PS.GZ )
Secure Multiplication of Shared Secrets in the Exponent
Mario Di Raimondo and Rosario Gennaro
2003/056 ( PS PS.GZ PDF )
Computing of Trust in Distributed Networks
Huafei Zhu and Bao Feng and Robert H. Deng
2003/055 ( PDF )
A New Approach to Prevent Blackmailing in E-Cash
Xiaofeng Chen and Fangguo Zhang and Yumin Wang
2003/054 ( PS PS.GZ PDF )
ID based Cryptosystems with Pairing on Elliptic Curve
Ryuichi SAKAI and Masao KASAHARA
2003/053 ( PS PS.GZ )
Tate-pairing implementations for tripartite key agreement
Iwan Duursma and Hyang-Sook Lee
2003/052 ( PDF )
Attacking RSA-based Sessions in SSL/TLS
Vlastimil Klima and Ondrej Pokorny and Tomas Rosa
2003/051 ( PS PS.GZ )
How to Predict the Output of a Hardware Random Number Generator
Markus Dichtl
2003/050 ( PS PS.GZ PDF )
Concealment and its Applications to Authenticated Encryption
Yevgeniy Dodis and Jee Hea An
2003/049 ( PS PS.GZ PDF )
Hidden Number Problem in Small Subgroups
Igor Shparlinski and Arne Winterhof
2003/048 ( PS PS.GZ PDF )
Compounding Secret Sharing Schemes
E. Martinez-Moro, J. Mozo-Fernandez, C. Munuera
2003/047 ( PS PS.GZ PDF )
A Construction of 100 bit Public-Key Cryptosystem and Digital Signature Scheme
Masao KASAHARA and Ryuichi SAKAI
2003/046 ( PS PS.GZ PDF )
Remarks on Saeednia's Identity-based Society Oriented Signature Scheme with Anonymous Signers
Guilin Wang, and Bo Zhu
2003/045 ( PDF )
An algorithm to obtain an RSA modulus with a large private key
L. Hern\'{a}ndez Encinas and J. Mu\~{n}oz Masqu\'{e} and A. Queiruga Dios
2003/044 ( -- withdrawn -- )
Signcryption scheme for Identity-based Cryptosystems
Divya Nalla, K.C.Reddy
2003/043 ( -- withdrawn -- )
Parallel Signcryption with OAEP, PSS-R, and other Feistel Paddings
Yevgeniy Dodis and Michael J. Freedman and Shabsi Walfish
2003/042 ( PS PS.GZ )
Timed Fair Exchange of Standard Signatures
Juan A. Garay and Carl Pomerance
2003/041 ( PS PS.GZ )
A new statistical distinguisher for the shrinking generator
Jovan Dj. Golic and Renato Menicocci
2003/040 ( PS PS.GZ )
Computing Partial Walsh Transform from the Algebraic Normal Form of a Boolean Function
Kishan Chand Gupta and Palash Sarkar
2003/039 ( PS PS.GZ PDF )
Torus-based cryptography
Karl Rubin and Alice Silverberg
2003/038 ( PS PS.GZ PDF )
Pretty-Simple Password-Authenticated Key-Exchange Under Standard Assumptions
Kazukuni Kobara and Hideki Imai
2003/037 ( PS PS.GZ PDF )
Strengthening Zero-Knowledge Protocols using Signatures
Juan A. Garay and Philip MacKenzie and Ke Yang
2003/036 ( PS PS.GZ PDF )
Cryptanalysis of a public-key encryption scheme based on the polynomial reconstruction problem
Jean-Sebastien Coron
2003/035 ( PDF )
On alternative approach for verifiable secret sharing
Kamil Kulesza and Zbigniew Kotulski and Josef Pieprzyk
2003/034 ( PS PS.GZ PDF )
On the (In)security of the Fiat-Shamir Paradigm
Shafi Goldwasser and Yael Tauman
2003/033 ( PDF )
Integral Cryptanalysis on reduced-round Safer++
Gilles Piret and Jean-Jacques Quisquater
2003/032 ( PS PS.GZ )
A Framework for Password-Based Authenticated Key Exchange
Rosario Gennaro and Yehuda Lindell
2003/031 ( PS PS.GZ PDF )
Cryptographic Tamper Evidence
Gene Itkis
2003/030 ( PS PS.GZ PDF )
Efficient Multi-Party Computation over Rings
Ronald Cramer and Serge Fehr and Yuval Ishai and Eyal Kushilevitz
2003/029 ( -- withdrawn -- )
Universal Padding Schemes for RSA with Optimal Bandwidth of Message Recovery
Wenbo Mao and John Malone-Lee
2003/028 ( PS PS.GZ PDF )
Elliptic Curve Cryptosystems in the Presence of Permanent and Transient Faults
Mathieu Ciet and Marc Joye
2003/027 ( PS PS.GZ )
Cryptographic Randomized Response Techniques
Andris Ambainis and Markus Jakobsson and Helger Lipmaa
2003/026 ( PS PS.GZ PDF )
Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to Elliptic Curves (Update)
Jan Pelzl and Thomas Wollinger and Jorge Guajardo and Christof Paar
2003/025 ( PS PS.GZ )
Homomorphic public-key cryptosystems and encrypting boolean circuits
D.Grigoriev. I.Ponomarenko
2003/024 ( PS PS.GZ PDF )
On Modeling IND-CCA Security in Cryptographic Protocols
Dennis Hofheinz and Joern Mueller-Quade and Rainer Steinwandt
2003/023 ( PS PS.GZ PDF )
New identity based signcryption schemes from pairings
Benoît Libert and Jean-Jacques Quisquater
2003/022 ( PS PS.GZ PDF )
Did Filiol Break AES ?
Nicolas T. Courtois and Robert T. Johnson and Pascal Junod and Thomas Pornin and Michael Scott
2003/021 ( PS PS.GZ )
Interleaving Cryptography and Mechanism Design: The Case of Online Auctions
Edith Elkind and Helger Lipmaa
2003/020 ( PS PS.GZ PDF )
Attacks based on Conditional Correlations against the Nonlinear Filter Generator
Bernhard L\"ohlein
2003/019 ( PS PS.GZ PDF )
A Polynomial Time Algorithm for the Braid Diffie-Hellman Conjugacy Problem
Jung Hee Cheon and Byungheup Jun
2003/018 ( PS PS.GZ PDF )
An Authenticated Group Key Agreement Protocol on Braid groups
2003/017 ( PS PS.GZ )
Perfect Hash Families with Few Functions
Simon R. Blackburn
2003/016 ( PS PS.GZ PDF )
A Threshold GQ Signature Scheme
Cheng-Kang Chu and Li-Shan Liu and Wen-Guey Tzeng
2003/015 ( PS PS.GZ PDF )
A Universally Composable Cryptographic Library
Michael Backes and Birgit Pfitzmann and Michael Waidner
2003/014 ( PS PS.GZ )
Hiji-bij-bij: A New Stream Cipher with a Self-Synchronizing Mode of Operation
Palash Sarkar
2003/013 ( PS PS.GZ PDF )
Security Constraints on the Oswald-Aigner Exponentiation Algorithm
Colin D. Walter
2003/012 ( PS PS.GZ PDF )
The number of initial states of the RC4 cipher with the same cycle structure
Marina Pudovkina
2003/011 ( PS PS.GZ PDF )
Cryptanalysis of Lee-Hwang-Li's Key Authentication Scheme
Fangguo Zhang and Kwangjo Kim
2003/010 ( PDF )
Differential Fault Analysis on A.E.S.
P. Dusart, G. Letourneux and O. Vivolo
2003/009 ( PS PS.GZ )
Domain Extenders for UOWHF: A Finite Binary Tree Algorithm
Palash Sarkar
2003/008 ( PS PS.GZ )
Christophe Giraud
2003/007 ( -- withdrawn -- )
A Price Negotiable Transaction System
Huafei Zhu
2003/006 ( PS PS.GZ PDF )
Multi-Party Computation from any Linear Secret Sharing Scheme Secure against Adaptive Adversary: The Zero-Error Case
Ventzislav Nikov, Svetla Nikova, Bart Preneel
2003/005 ( PS PS.GZ PDF )
Distributing the Encryption and Decryption of a Block Cipher
Keith M. Martin, Rei Safavi-Naini, Huaxiong Wang and Peter R. Wild
2003/004 ( PS PS.GZ PDF )
ID-based tripartite Authenticated Key Agreement Protocols from pairings
Divya Nalla, and K.C.Reddy
2003/003 ( PS PS.GZ )
Plaintext-dependant Repetition Codes Cryptanalysis of Block Ciphers - The AES Case
2003/002 ( PS PS.GZ PDF )
Imperfect Decryption and an Attack on the NTRU Encryption Scheme
John Proos
2003/001 ( PDF )
A Mode of Operation with Partial Encryption and Message Integrity
Philip Hawkes and Gregory G. Rose

[ Cryptology ePrint archive ]